PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables

Size: px
Start display at page:

Download "PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables"

Transcription

1 IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY PAPER A Proximity-Based Self-Organizing Hierarchical Overlay Framework for Distributed Hash Tables Kwangwook SHIN a), Student Member, Seunghak LEE, Geunhwi LIM, and Hyunsoo YOON, Nonmembers SUMMARY Several structured peer-to-peer networks have been created to solve the scalability problem of previous peer-to-peer systems such as Gnutella and Napster. These peer-to-peer networks which support distributed hash table functionality construct a sort of structured overlay network, which can cause a topology mismatch between the overlay and the underlying physical network. To solve this mismatch problem, we propose a topology-aware hierarchical overlay framework for DHTs. The hierarchical approach for the overlay is based on the concept that the underlying global Internet is also a hierarchical architecture, that is, a network of networks. This hierarchical approach for the overlay puts forth two benefits: finding data in a physically near place with a high probability, and smaller lookup time. Our hierarchical overlay framework is different from other hierarchical architecture systems in a sense that it provides a specific selforganizing grouping algorithm. Our additional optimization schemes complete the basic algorithm which constructs a hierarchical structure without any central control. key words: peer-to-peer, DHT, physical topology, hierarchical architecture, overlay network, efficient replication 1. Introduction Peer-to-peer networks can be characterized as selforganized dynamic server set (which also plays the role of the client). In the peer-to-peer networks, the node can join or leave the networks at any time and there is no control of the central coordinator. Several peer-to-peer lookup networks which support distributed hash table functionality have been created to solve the scalability problems of previous peerto-peer systems such as Gnutella and Napster [1] [3]. In the DHT (Distributed Hash Table) systems, one stores data in the node determined by the hash function and the other looks up the node storing data with the same hash function. Each node in the overlay network has the partial location information for logical routing. The partial location information is well distributed, so that one can be closer and closer to the destination on every logical hop. These peer-to-peer networks which support distributed hash table functionality construct a sort of structured overlay network, which can cause a topology mismatch between the overlay and the underlying physical network. The physical distance between the node looking for some data and the node storing this data may be long. In addition, the lookup time can also be large because the system does not consider the physical topology when it stores or replicates data. Manuscript received September 7, Manuscript revised January 5, The authors are with EECS, KAIST, Korea. The author is with Samsung Electronics Co., Korea. a) kwshin@nslab.kaist.ac.kr DOI: /ietcom/e90 b Fig. 1 The hierarchical structure of Grapes. We propose a hierarchical overlay framework, which is named Grapes [4], for DHTs. Grapes constructs the hierarchical structure using physical topology information. Grapes has a two-layer hierarchical structure, sub-network, and super-network as shown in Fig. 1. In Grapes, nodes physically near each other construct the sub-network, and the leaders of each sub-network form the super-network. This hierarchical approach puts forth two benefits. First, a node can find data in its sub-network with a high probability due to the replicated data publication (data replication) in its sub-network. Grapes supports the efficient data replication considering the physical topology. Second, the hierarchical structure with the physical information makes the lookup time smaller. There are some other schemes to provide hierarchical concepts for peer-to-peer networks. Our hierarchical overlay framework is different from other hierarchical architecture systems in a sense that it provides a specific self-organizing grouping algorithm. To the best of our knowledge, Grapes is the only unique topology-aware hierarchical overlay network which supports the original peerto-peer concept of self-organization. The rest of this paper is structured as follows. We discuss the related work in Sect. 2. Sections 3 and 4 describe the basic design of Grapes and the optimization methods for the Grapes. Section 5 demonstrates the performance evaluation by simulation. Finally, we conclude the paper in Sect Related Work 2.1 DHT (Distributed Hash Tables) Systems CAN [5], Chord [6], Pastry [7] and Tapestry [8] are repre- Copyright c 2007 The Institute of Electronics, Information and Communication Engineers

2 1652 IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 sentative DHT-based peer-to-peer lookup services. In CAN [5], the problem due to lack of physical distance information is compensated by two heuristic methods. First, each node measures its network delay to a set of landmarks and orders the landmarks in order of increasing RTT. Nodes with the same orderings are inserted into the same portion of the coordinate space, which makes logical neighbor physically close to each other [5], [9]. This heuristic is categorized into the Proximity Identifier Selection (PIS) by [10]. Second, the CAN node can forward a message to its neighbor with the maximum ratio of progress to RTT. This heuristic is categorized into the Proximity Route Selection (PRS) by [10]. Original Chord does not consider physical distance information, but enhanced scheme [11], [12] uses PRS. There are potentially several possible next hop neighbors that are closer to the message s key in the id space. PRS is to select, among the possible next hops, the one that is closest in the physical network or one that represents a good compromise between progress in the id space and proximity. In Tapestry [8] and Pastry [7], when a new node is inserted to the overlay network, it finds the bootstrap node close to it in physical distance by expanded ring search or out of band communication. Also, they can choose physically closer neighbors among the neighbor candidates when they construct the routing tables. This is categorized into Proximity Neighbor Selection (PNS) by [10]. However, the objective of all the above optimization methods (except Tapestry) considering physical topology is only to make the immediate neighbors in the overlay network close on the Internet. The physical distance between the node looking for some data and the node storing this data may still be long. It is because the above methods do not provide the framework for the efficient data replication with the physical information. Tapestry provides some kind of data replication scheme considering physical topology. When the Tapestry node publishes an object, the node stores its pointer in the root node of this object. The pointer is also stored in the nodes on the path from the publishing node to the root. When a node finds the object, it locates the object by routing a message to the root. Each node on the path checks whether it has a pointer for the object. If so, it redirects the message to the node of the pointer. If there are replicas of an object on various publishing node, the node locates the object in the logically closer node. In Tapestry, since the overlay is structured with PNS, the logical neighbor is somewhat physically close. This makes the possibility that the node finds the object in the physically closer node among the replicas higher. However, Tapestry does not consider hierarchical architecture overlay. To harmonize the virtual overlay with Internet physical topology, we think, the hierarchical approach is one of the best solution because global scale Internet is composed of various localized networks, which forms a hierarchical architecture. 2.2 Hierarchical Architecture Systems Brocade [13] proposed a similar hierarchical architecture based on physical topology. Brocade constructs a secondary overlay to be layered on top of peer-to-peer lookup systems. The secondary overlay builds a location layer between the super-nodes. The nodes looking for some data which is stored in the long distant node, find a local super-node at first. Then the super-node determines the network domain of the destination and routes directly to that domain, which brings the shorter lookup time. A super-node is determined by the election algorithm between nodes or by the system administrator. Gateway routers or machines close to the routers are attractive candidates for super-nodes. Brocade does not provide any specific algorithm to determine whether the joining node is the super-node or the normal node. [13] mentioned that Brocade uses a kind of election algorithm to decide the super-node in an ISP, but no specific algorithm has been proposed. Neither does Brocade suggest any process to organize super-node s cover set with normal nodes in an ISP. Grapes suggests a specific self-organizing algorithm which constructs the hierarchical structure. In Grapes, any node can be a leader or sub-node depending upon the order of node insertion, and the nodes construct the hierarchical overlay network in an autonomous manner without any support of central coordinator. This kind of selforganization makes Grapes more suitable for pure peer-topeer concepts. L. Garces-Erce et al. [14] provides a general framework for a hierarchical DHT. The peers are organized into groups. A group may consist of the peers topologically close to each other. Each group is required to have one or more superpeers which play the role of gateways between the groups. The peer looking for some data sends a query message to one of its superpeers. Then the message is delivered to the group that stores the data by top-level lookup service. The superpeer of the group that stores the data, routes the query message to the peer that is responsible for the data with intragroup routing. In this system, the peer joining the network must know the identifier of the group that the peer belongs to. The identifier may be the name of the peer s ISP or university campus. The peer looks up the group id in the peerto-peer network, and the destination gives the IP address of the superpeer which the peer will join. In order to get wellconstructed hierarchy, we think, this system needs the help of a central coordinator. Without the help of a central coordinator, the peers having the same ISP name but physically not close enough to each other may join the same group (e.g. tier-1 ISP). Also, the group of the peers in a university campus can be too small. Too small groups may downgrade the system performance like data lookup time. Grapes tries to make well-constructed hierarchy without any centralized control. 3. Design of Grapes 3.1 Node Insertion Any new node joining Grapes must know the contact point of at least one Grapes node, called the bootstrap node. When

3 SHIN et al.: A HIERARCHICAL OVERLAY FRAMEWORK FOR DHTS 1653 Fig. 2 Node insertion example in Grapes. a new node is inserted into Grapes, the new node checks its physical distance to the bootstrap node. If the physical distance is shorter than the given threshold, the new node is inserted into the sub-network of the bootstrap node. If the bootstrap node is the leader of the sub-network, the bootstrap node will be the leader of the new node. Otherwise, the bootstrap node notifies the new node of its leader. If the physical distance between the new node and the bootstrap node is longer than the threshold, the new node is inserted into the super-network. The new node checks its physical distance to the leaders on the route in the super-network. If it finds the leader to which the physical distance is shorter than the threshold, it is inserted into the sub-network of the leader. If there is no leader into which the new node is inserted on the route, the new node is inserted as a node (leader) into the super-network. In each layer of the overlay network, any peer-to-peer lookup routing algorithm such as CAN [5], Chord [6], Pastry [7], and Tapestry [8] can be used. In Fig. 2, the new node A joins Grapes with the help of the bootstrap node B. If the distance between A and B is shorter than the threshold, A is located in B s sub-network (A 1 ). Otherwise, A is not inserted into B s sub-network, but to B s super-network. A checks the physical distance to the leaders on the route in the super-network. In the figure, A is not inserted into C (and D, E, F) s sub-network because the distance between A and C (and D, E, F) is longer than the threshold. If the distance between A and G is shorter than the threshold, A is inserted into G s sub-network (A 2 ). If there is no appropriate leader on the route, A is inserted as a leader into the super-network (A 3 ). 3.2 Data Publication When a node publishes data, it looks for the node managing the hashed key of the data in its sub-network first. The node inserts the index of data into the node which manages the key of the data, and then the node inserts the index into the super-network. The node, with the help of its leader, looks for the leader managing the key in the super-network. If the destination leader does not have its own sub-network, the index is inserted into the destination leader. If the destination leader has its sub-network, the node looks for the node managing the key in the sub-network. In this case, finally, Fig. 3 Data publication example in Grapes. the index is inserted into the destination node in the subnetwork. The index of the data is a kind of metadata, one can get the list of the addresses of the data publication nodes from the index (The index can point to more than one data location when several nodes publish the same data). Data publication node periodically re-publishes the data, which refreshes the index timer of the data or inserts the index if the new destination node does not have the index. Every index has its own timer and when the timer expires the index is invalidated and removed. This periodic data publication makes Grapes fault-tolerant in a dynamic peer-to-peer environment. In Fig. 3, the node p is publishing the data into the network. Firstly, the node p looks for the node managing the key of the data in its sub-network. In this example, the node d 1 is managing the key of the data. The node p inserts the index of data to the node d 1 (the index points to the publishing node p). And then the node p looks for the node managing the key of the data in the super-network through its leader B. The lookup request is routed from B to G, andg forwards the request to its sub-network. Finally the node p becomes aware of the node d 2, which is managing the key of the data in the super-network. The node p inserts the index to the node d 2 (this index also points to the publishing node p). 3.3 Data Retrieval When a node retrieves data, it looks for the node managing the hashed key of the data in its sub-network first. If the sub-network does not have the index of data, the node looks up its super-network with the help of the leader. After the node retrieves the data from the target node to which the index points, it publishes the retrieved data. That is, the new index of data is inserted into both its sub-network and supernetwork. This data publication after the retrieval results in King [15], IDMaps [16], GNP [17] etc. suggested the latency estimation method between the arbitrary Internet end hosts. We assume that the physical distance can be obtained by any of the latency estimation methods. The route is determined by a peer-to-peer lookup routing algorithm e.g. CAN [5], Chord [6], Pastry [7], and Tapestry [8].

4 1654 IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 Fig. 4 Data retrieval example in Grapes. the data replication. If the index points to more than one node, the retrieving node selects the closest one as the target node. This replication makes a node able to find the data in its sub-network with a high probability. In Fig. 4, the nodes r 1 and r 2 are retrieving the data from the network. When the node r 1 retrieves the data, r 1 can find the index of data in its sub-network (from the node d 1 ). At the same time, the node r 1 gets the data from the publishing node p to which d 1 points. When the node r 2 retrieves the data, r 2 firstly looks up its sub-network. But the node d 3 does not have the index. And then the node r 2 looks for the node managing the key of the data in the supernetwork through its leader D. The lookup request is routed from D to G,andG forwards the request to its sub-network. Finally the node r 2 is aware that the node d 2 has the index. The node r 2 gets the data from the publishing node p to which d 2 points. After the nodes r 1 and r 2 retrieve the data from the target node p, they publish the data (r 1 inserts the index of data into d 1 and d 2 ; r 2 inserts the index into d 3 and d 2 ). 3.4 Neighbor Information In comparison with peer-to-peer lookup services without Grapes framework, the neighbor information in each Grapes node increases only by one (its leader s information or its first sub-node s information). The sub-node maintains a list of its neighbor s information collected from the subnetwork and it also maintains its leader s information. The leader maintains the neighbor s information gathered from the super-network and it also maintains the information about one of its sub-nodes. This one of the sub-nodes which joined the sub-network first of all is called the first sub-node. 3.5 Leader Replacement Every node in the sub-network maintains its leader information. Therefore, a sub-node can notice that its leader is crashed or has left the network without any notification, in the process of node inserting or data publication and retrieval. The sub-node that detects the leader s crash or unexpected leaving, firstly checks the specific logical location in its sub-network whether there is any new leader candidate information. If the specific logical location has the new leader information, the sub-node replaces its leader with the new leader. Otherwise, the sub-node takes over the subnetwork as a new leader. The specific logical location also maintains the neighbor information of the leader (the information of the leader s neighbors in the super-network and the information of one of its sub-nodes), which makes the new leader able to take over the old leader s logical position in the super-network. After the new leader took over the sub-network of the old leader, one of the neighbor nodes of the new leader becomes the first sub-node of the sub-network. The new leader stores its information and its neighbor information collected from the super-network in a specific logical location (in its sub-network). Each leader maintains the neighbor information of the first sub-node in case the first sub-node is crashed or has left the network without any notification. If the first sub-node failed, the leader selects one neighbor of the first sub-node as the new first sub-node. 4. Optimizations In this section, we propose some additional optimization schemes complementary to the basic algorithm. The additional optimization schemes are necessary because Grapes constructs a hierarchical architecture without any central control. If there is a central coordinator or a system administrator, one can construct the optimal architecture based on the physical proximity because the central coordinator or the system administrator can acquire the global physical topology information. In Grapes, however, it is not easy to construct the optimal hierarchical architecture due to the characteristic of the self organization. In this section, we propose three optimization schemes; Sub-network partition, Sub-network integration, andsub-node migration. Even if the three optimization schemes do not provide the optimal hierarchical architecture, they help Grapes to have a more efficient hierarchical structure. 4.1 Sub-Network Partition Sub-network partition prevents the specific sub-network from maintaining too large number of nodes. If the size of the sub-network gets bigger, the average delay between sub-nodes increases, which downgrades the system performance (data lookup time and direct delay for data retrieval). Sub-network partition procedure is as follows. 1. The leader (super-node) floods activate partition message to the sub-network when it notices that the number With CAN or Chord, the new leader takes over the old leader s logical position in super-network without considering node ID, whereas with Tapestry or Pastry, we should consider node ID. To prevent node ID collision problem, a new leader newly joins the super-network and locates its logical position with its own node ID.

5 SHIN et al.: A HIERARCHICAL OVERLAY FRAMEWORK FOR DHTS 1655 of its sub-nodes is above the maximum limit.theactivate partition message has the address of the leader and the new leader candidate node. 2. Receiving the activate partition message, each subnode determines which node is its leader, the old leader or the new leader candidate, depending upon its physical distance between them. The sub-node chooses the closer node between the old leader and the new leader candidate as the leader. 4.2 Sub-Network Integration Sub-network integration plans to organize better architecture by way of unifying two small sub-networks. Subnetwork integration procedure is as follows. 1. If a node chances on the super-node to which the physical distance is below the threshold in the process of data publication or retrieval, the node sends initiate integration message to its leader. Initiate integration message has the address of the new near super-node discovered. 2. If the number of sub-nodes is below the minimum limit, and also if the distance between the leader and the new near super-node is below half the threshold, the leader checks whether the new near super-node can accept integration by sending check integration message. 3. The new near super-node checks how many sub-nodes exist in its sub-network. If the summation of the number of sub-nodes in two sub-networks is above the maximum limit, sub-network integration process halts with reject integration message from the new near supernode. 4. If the new near super-node can accept integration, the leader which has smaller number of sub-nodes between two sub-networks floods activate integration message to its own sub-network. Activate integration message has the address of the corresponding super-node. 5. All the nodes (including the leader and the sub-nodes) in the smaller sub-network are inserted to the larger sub-network with the help of the leader of the larger sub-network as the bootstrap node. 4.3 Sub-Node Migration Sub-node migration is the optimization scheme to make the average delay between sub-nodes in the sub-network shorter. Sub-node migration procedure is as follows. 1. If a node chances on the super-node to which the physical distance is below half the distance to its leader in the process of data publication or retrieval, the node sends initiate migration message to its leader. 2. If the number of sub-nodes is not below the minimum limit, the leader sends activate migration message to the sub-node. If the number of sub-nodes is below the minimum limit, Sub-network integration step 2 begins. 3. The node is inserted to the new sub-network with the help of the new near super-node as the bootstrap node. Algorithm 1 7 present the pseudo code of the above three optimization schemes. Algorithm 1 3 and Algorithm 4 7 respectively describe the action of the sub-node and the super-node when the optimization process begins. Algorithm 1 Action of the sub-node on discovering the new near supernode to which distance is below the threshold T d S the distance to the new near super-node d L the distance to its leader if d S > 1 2 d L then sends initiate integration message to its leader and waits the reply from the leader if receiving activate integration message then bootstrap node the new near super-node re-inserts itself to the network if receiving no action message then RETURN {d S 1 2 d L} sends initiate migration message to its leader and waits the reply from the leader if receiving activate migration or activate integration message then bootstrap node the new near super-node re-inserts itself to the network if receiving no action message then RETURN Algorithm 2 Action of the sub-node on receiving activate integration message from its leader {its leader receives check integration message from another super-node S and its leader s sub-network size is smaller than S s} bootstrap node S re-inserts itself to the network The maximum limit can be represented by f 1 (N). N is the number of the nodes in the entire system and f 1 is the function which the system can select. On the assumption that all the nodes are linked by predecessor and successor on the identifiers space, N can be estimated by 1/d(s, succ(s)) [18]. 1/d(s, succ(s)) is logical distance between the node s and the successor of s. If a node chances on the super-node to which the distance is also below half the distance to its leader, Sub-node migration process is initiated. The minimum limit can be represented by f 2 (N). N is the number of the nodes in the entire system and f 2 is the function which the system can select.

6 1656 IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 Algorithm 3 Action of the sub-node on receiving activate partition message from its leader {activate partition message has the address of its leader and the new leader candidate node} d L the distance to its leader d C the distance to the new leader candidate node if d C < d L then bootstrap node the new leader candidate node re-inserts itself to the network {d C d L } bootstrap node its leader re-inserts itself to the network Algorithm 4 Action of the super-node on receiving check integration message from another super-node S {check integration message has the number of nodes in another supernode S s sub-network} n L the number of the nodes in its sub-network n A the number of nodes in S s sub-network if (n L + n A ) > maximum limit then replies reject integration message to S replies accept integration message to S if n L < n A then floods activate integration message to its sub-network Algorithm 5 Action of the super-node on noticing the number of the nodes in its sub-network is above the maximum limit floods activate partition message to its sub-network 5. Simulation 5.1 Methodology We used Inet [16] topologies of 3,500 autonomous systems (AS) in our experiments. Among the 3,500 autonomous systems, we randomly chose 500 ASs. We assumed the number of nodes in each AS is 10,000, and the maximum percentage of nodes joining the system is 2% of the number of nodes in each AS, which makes the maximum number of joining nodes 100,000. We also assumed the delay between the nodes in the same AS to be 0. We selected the 2-dimensional CAN algorithm as the peer-to-peer lookup algorithm in both the sub-network and super-network (when we use Grapes). Algorithm 6 Action of the super-node on receiving initiate integration message from one of its sub-nodes {initiate integration message has the address of the new near super-node} n L the number of the nodes in its sub-network d LS the distance to the new near super-node T threshold TO INTEGRATION: if n L minimum limit or d LS 1 2 T then replies no action message to its sub-node {n L < minimum limit and d LS < 1 2 T} sends check integration message to the new near super-node and waits the reply from it if receiving accept integration message then {accept integration message has the number of the nodes in the new near super-node s sub-network} n S the number of the nodes in the new near super-node s subnetwork if n L n S then floods activate integration message to its sub-network bootstrap node the new near super-node re-inserts itself to the network {n L > n S } replies no action message to its sub-node {receiving reject integration message} replies no action message to its sub-node Algorithm 7 Action of the super-node on receiving initiate migration message from one of its sub-nodes {initiate migration message has the address of the new near super-node} n L the number of the nodes in its sub-network if n L minimum limit then replies active migration message to its sub-node goto TO INTEGRATION 5.2 Effects of Optimizations To show the effects of optimization schemes, we use the simulation parameters as presented in Table 1. In the simulation, Sub-network integration or Sub-node migration is initiated when each node chances on the super-node to which the physical distance is below the threshold in the process of 10 data lookup per a node. We decided the maximum limit to be the square root of the number of nodes joining the system and the minimum limit to be the half of the maximum limit. If 2-dimensional CAN is used as a lookup algorithm in both the super-network and the subnetwork like our simulation environment, the summation of

7 SHIN et al.: A HIERARCHICAL OVERLAY FRAMEWORK FOR DHTS 1657 Table 1 Simulation parameters (effects of optimizations). Number of nodes 10,000 Maximum limit 100 Minimum limit 50 Threshold 25,50,75,100, 125,150(ms) Data lookup for optimizations 10 per 1 node the average number of hops in the super-network and the sub-network is minimal when the number of sub-networks is N and the size of each sub-network is N (where N is the number of nodes in the whole network). The simple analysis is as follows. y: the summation of the average number of hops in the super-network and the sub-network x: the number of sub-networks N: the number of nodes in the whole network Fig. 5 The effects of optimizations (1). y = 1 1 N N + (1) 2 2 x y = 1 4 x Nx 3 2 (2) 4 When y = 0, x = N. Therefore, if x = N, y has the minimum value. Based on the simple analysis above, we choose N as a heuristic basis to decide the maximum limit and the minimum limit. We set the maximum limit and the minimum limit to N and 1 2 N respectively in the simulation. Figure 5 and Fig. 6 show the effects of three optimization schemes; Sub-network partition, Sub-network integration and Sub-node migration. Figure 5 presents the number of leaders in the network over a range of thresholds. The heuristic basis number of leaders in our simulation environment is 100, the square root of the number of nodes that joined the system. The number of leaders in the optimized Grapes is closer to the basis number than that in the basic Grapes. Figure 6 shows the average delay of each sub-node to its leader over a range of thresholds. The average delay in the optimized Grapes is about 30 70% of that in the basic Grapes over a range of thresholds. Figure 5 and Fig. 6 also show the performance difference over the various thresholds. If the threshold is smaller, the average delay between the sub-nodes and the leader is shorter but the number of leaders is much larger than the basis number. If the threshold is larger, the number of leaders is closer to the basis number but the diameter of the sub-network is longer. The optimal threshold is determined by considering the tradeoff between the number of leaders and the diameter of the sub-network. Also, the optimal threshold is concerned with the physical internet topology below and how many nodes joined the system in each AS among the total number of nodes in the system. Therefore, it is almost impossible to find the optimal value of the threshold. We are researching on some heuristic, distributed and dynamic methods of setting the reasonable value of the threshold. In the following Table 2 Fig. 6 The effects of optimizations (2). Simulation parameters (performance comparison). Threshold 75(ms) Kinds of data 1,000 Number of nodes 10,000;40,000; 70,000;100,000 Number of data access per node 5 Data access pattern Uniform Exponential simulations, the threshold is set to the specific value, 75 ms. 5.3 Performance Comparison To compare the performance, we use the simulation parameters as presented in Table 2. We assumed that there were 1,000 kinds of data and each node looked up the data 5 times. The uniform data access pattern means the data access pattern follows the uniform distribution. The probabilities of accessing each piece of data are identical. And the exponential data access means the data access pattern follows the exponential distribution. The probability of accessing a few popular data is high and the probability of The average routing path length in CAN is d 4 n 1 d [5]. d means d-dimensional CAN and n equals the number of joining nodes.

8 1658 IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 Fig. 7 Data publication time. accessing most of the unpopular data is low. Figure 7 shows data publication time when an arbitrary node inserts data index into bare bones CAN, CAN with PIS, Grapes, and optimized Grapes. Grapes and optimized Grapes use bare bones CAN as the peer-to-peer lookup algorithm in both the sub-network and super-network. In Grapes, the data index is inserted into both the sub-network and the super-network. During the index insertion into the super-network, if the destination leader has its own sub-network, the index is inserted into the sub-network of the leader. In the maximum case, the data publication needs two sub-network path routings and one super-network path routing. Because the sub-network is composed of the nodes near each other, the routing delay for each hop in the sub-network is very small. In the super-network, the average routing delay for each hop is the same as the original CAN. However, the less number of hops (in proportion to the number of leaders) makes the total routing delay smaller. The data publication time depends on the index insertion path routing delay in the overlay network. The hierarchical structure with the physical information (the physically near sub-network and the super-network with the small number of routing hops) makes Grapes have the smaller path routing delay than that of the original CAN. The figure presents the data publication time while the number of nodes is increasing. In spite of inserting data index twice, into the sub-network and super-network, the data publication time in Grapes is shorter than that of the original CAN and even that of CAN with PIS. The data publication time in optimized Grapes is the shortest of all. Figure 8 shows the data lookup time when an arbitrary node retrieves data from bare bones CAN, CAN with PIS, CAN with PRS, CAN with PIS and PRS, Grapes with bare bones CAN and optimized Grapes with bare bones CAN. The data lookup time depends on the path routing delay and the effects of data replication. Even if the node storing data is located in another sub-network, the total routing delay in Grapes is smaller than that of CAN without Grapes framework. Also, if the data is located in the same sub-network, the path routing delay is much shorter. The figure presents the data lookup time while the number of nodes is increasing. It shows that optimized Grapes with exponential data access (OG-E) is the most scalable scheme with regard to the network size. The data lookup time in optimized Grapes Fig. 9 Fig. 8 Data lookup time. Direct delay for data retrieval. with exponential data access is one thirtieth of that of bare bones CAN when the number of nodes is 100,000. Also we can find that Grapes with uniform data access (it has the longest data lookup time among Grapes schemes) is more scalable than CAN with PIS and PRS. Figure 9 shows the delay between the data retrieving node and the data storing node in the physical network. We refer this delay as direct delay. The direct delay depends on the location of the data. Data replication in Grapes makes the node enable to find the data in its own sub-network with a high probability. Therefore, the direct delay for data retrieval in Grapes is smaller than that in CAN. The figure presents the direct delay between two ends while the number of nodes is increasing. The direct delay in both Grapes and optimized Grapes is decreasing as the number of nodes is increasing. The reason is as follows. While the number of nodes is increasing in Grapes, the number of nodes in the sub-network is also increasing, which makes the probability of retrieval from the sub-network high (The number of autonomous systems is fixed to 3,500 in the simulation). Also, we can find that the delay in CAN with PIS is longer than that in bare bones CAN. CAN with PIS makes logical neighbor physically closer. While the nodes that are physically close to each other are clustered in a logical space, the data is distributed in a random way. It makes the data stor- Bare bones CAN is CAN with no optimization scheme [5].

9 SHIN et al.: A HIERARCHICAL OVERLAY FRAMEWORK FOR DHTS 1659 Table 3 Simulation parameters (communication overhead). Threshold 75(ms) 10,000;40,000; Number of nodes(n) 70,000;100,000 Maximum limit N 1 Minimum limit 2 N Data lookup for optimizations 10 per 1 node Fig. 11 Fig. 10 Data lookup time with replication. Direct delay for data retrieval with replication. ing node physically farther from the data lookup node. So the average delay between the two ends in CAN with PIS is a little bit longer than that in bare bones CAN. Figure 10 and Fig. 11 present the data lookup time and the direct delay for data retrieval with regard to the size of data replication. To show the effects of the data replication, we modified CAN. Modified CAN stores R replica at random nodes in the overlay network. When a node retrieves data, the lookup process checks for each node on the route, whether or not the node has the replica of the data. If there is a replica on the route, the node retrieves the data from the first midway node storing the replica. We configured CAN with PIS and used PRS routing in this simulation. PRS is to select, among the possible next hops, the one that is closest in the physical network. PRS routing makes data lookup time shorter than the routing in selecting the random one among the possible next hops. CAN with PIS makes logical neighbor physically close to each other. If we retrieve data from the first midway node which stores a replica on the DHT route, we can expect the data lookup time and the direct delay for data retrieval be shorter as the number of replicas increases. R replica in Grapes is to replicate the data in R sub-network which is randomly selected. The maximum number of replicas in Grapes is the number of leaders (or sub-networks). When the Grapes node retrieves data, it looks for the node managing the hashed key of the data in its sub-network first. If the sub-network does not have the data, the node looks up its super-network with the help of the leader. After the node retrieves the data from the target node, it replicates the data in its own sub-network. In this simulation, we turned off this replication operation in order to prevent the total number of replicas from exceeding the simulation parameter value. In this simulation, the number of hosts is set to 10,000. Both optimized Grapes and CAN use uniform data access pattern which accesses all the data with the same frequency. The number of leaders in optimized Grapes is about 420, in this simulation. The maximum number of replicas is limited by the number of leaders in Grapes. Therefore, when the number of replicas is above 400 (450 and 500), the effects of the replication are restricted by the number of leaders. Figure 10 shows the data lookup time while the number of replicas increases. The data lookup time in Grapes is about one third of that in CAN when the number of replicas is 50 and about one ninth of that in CAN when the number of replicas is 450. Figure 11 shows the direct delay for data retrieval between the request node and the data storing node while the number of replicas increases. When the number of replicas is 50, the average direct delay in both Grapes and CAN is about 90 ms. However, the difference in the delay between Grapes and CAN increases with regard to the size of data replication. The maximum difference is when the number of replicas is 450. In Grapes, both the data lookup time and the direct delay with the larger data replication above 450 mean nothing. (We limited the maximum number of replicas to the number of sub-networks.) However, those in CAN decrease as the number of replicas increases over 450. Although the figures show the results below 500 data replicas, but we found a fact, through simulation, that for Grapes data lookup time and direct delay is visible for around 450 replicas whereas for CAN a similar data lookup time and direct delay is visible for around 3,000 and 3,500 replicas respectively. The 3,000 and 3,500 data replicas are about one third of the number of total hosts in the network, which is considerably a huge data replication. 5.4 Communication Overhead While the performance of Grapes is superior to that of the original CAN, Grapes need additional communication overhead cost. To analyze the communication overhead of Grapes, we use the simulation parameters as presented in Table 3. The threshold used for structuring the hierarchy of Grapes is set to 75 ms. We took a look at the changes in the communication overhead while the number of nodes is increasing. The maximum limit used for the optimization schemes is set to the square root of the number of nodes

10 1660 IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 Table 4 Communication overhead per a node. Node RTT ActPart PartRoute InitInteg ChkInteg ActInteg IntRoute InitMig ActMig MigRoute 10, , , , and the minimum limit is set to the half of the maximum limit. Optimization process, especially Sub-network integration and Sub-node migration, is initiated when each node happens to come in contact with a super-node where physical distance is below the threshold in the process of 10 data lookup per node. In this part of simulation, we did not consider the node s leave or failure. Additional communication overhead of the optimized Grapes is as follows. Table 4 shows how many messages each node transmits while the number of nodes is increasing. The new node inserted to Grapes checks its physical distance to the leaders on the route in the super-network. This needs the RTT check message, which the new node sends to the leaders and the response message that the leader sends back. The frequency of the RTT check message is equal to that of the response message. RTT column in Table 4 shows the frequency of the RTT check message and the response message per node while the number of nodes is increasing. When the number of the sub-nodes is above the maximum limit, the leader floods activate partition message to its sub-network. Each sub-node receiving the activate partition message checks its physical distance to the leader candidate. The address of the new leader candidate is included in the activate partition message. The sub-node chooses the closer node (between the old leader and the new leader candidate) as the leader, which partitions the subnetwork. When all the sub-nodes check the physical distance, the RTT check message and the response message is transmitted. The frequency of the activate partition message is equal to that of the RTT check message and the response message. ActPart column in Table 4 shows the frequency of the activate partition message, the RTT check message and the response message. When the sub-network is partitioned, its sub-nodes are inserted either to old leader s sub-network or to new leader candidate s sub-network. This additional insertion of sub-nodes produces a routing message overhead on the sub-network. PartRoute column in Table 4 shows the frequency of the additional sub-network routing message. If a sub-node happens to come in contact with a supernode to which the physical distance is below the threshold in the process of data publication or retrieval, the node sends an initiate integration message to its leader. If a sub-node happens to come in contact with a super-node to which the physical distance is below half the distance to its leader, the node sends an initiate migration message to its leader instead of initiate integration message. InitInteg and InitMig column in Table 4 show the frequency of initiate integration message and initiate migration message respectively. If the number of sub-nodes is small enough for an efficient integration (below the minimum limit), and also if the dis- Table 5 Total communication overhead. Number of nodes Total message frequency per a node 10, , , , tance between the leader and the new near super-node is considerably near (below half the threshold), the leader receiving initiate integration message checks whether the new near super-node can accept integration by sending check integration message. The new near super-node checks how many sub-nodes exist in its sub-network. If the summation of the number of sub-nodes in two sub-networks is below the maximum limit, the new near super-node sends accept integration message. Otherwise, the new near super-node sends reject integration message. The frequency of check integration message is equal to that of the response message (accept/reject integration message). ChkInteg column in Table 4 shows the frequency of check integration message and the response message. If the new near super-node can accept integration, the leader which has smaller number of sub-nodes between two sub-networks floods activate integration message to its own sub-network (ActInteg column in Table 4). The sub-nodes receiving activate integration message are inserted to the correspondent leader s subnetwork. This additional insertion of sub-nodes produces routing message overhead on the sub-network (IntRoute column in Table 4). If the number of sub-nodes is small enough (below the minimum limit), the leader receiving initiate migration message tries to do Sub-network integration process. Otherwise, the leader sends activate migration message to the sub-node (ActMig column in Table 4). The sub-node receiving activate migration message is inserted to the correspondent leader s sub-network. This additional insertion of the sub-node produces routing message overhead on the sub-network (MigRoute column in Table 4). Table 4 shows top three messages (RTT, InitInteg, and IntRoute) produce most of communication overhead (about 96 97% of total communication overhead in Table 5). The frequency of these three messages per node is increasing as the number of nodes is increasing. The degree of the increment, however, is decreasing. Table 5 presents the total message frequency per node while the number of nodes is increasing. The total message frequency includes all kinds of overhead messages in Table 4 (especially the frequency of RTT which is added twice, ActPart three times, and ChkIteg twice). The frequency of the total messages per node is increasing while the number of nodes is increasing. The degree of the increment, however, is decreasing.

11 SHIN et al.: A HIERARCHICAL OVERLAY FRAMEWORK FOR DHTS 1661 If we assume the size of all the messages to be 50 bytes (IP header 20 bytes, TCP header 20 bytes, and additional information such as message identification tag and node address 10 bytes), total communication overhead is about 5,700 bytes per node even when the number of nodes is 100,000. The simulation time where each node executes 10 data lookups is 1,000 seconds. The communication overhead each node produces is about 5.7 bytes per second (that is 45.6 bps) when the number of nodes is 100, Conclusion In this paper, we proposed a proximity-based selforganizing hierarchical overlay framework for DHTs, called Grapes. In Grapes, a node can find data in its sub-network with a high probability due to the data replication in its sub-network. In DHT systems, the replication is important to make up for the reliability problem due to the dynamic characteristic of peer-to-peer network. Grapes supports an efficient data replication considering the physical topology. Grapes also makes the lookup time smaller than that of the flat one due to the hierarchical structure using the physical information. There are some other schemes to provide hierarchical concepts for peer-to-peer networks. Grapes is different from those in a sense that it provides the specific grouping algorithm without any centralized control. Grapes is the only unique topology-aware hierarchical overlay network supporting the original peer-to-peer concept of self-organization. Due to its self-organization characteristic, Grapes is not easy to make an optimal hierarchical structure. To solve this problem, we proposed three optimization schemes; Sub-network partition, Sub-network integration,andsub-node migration. The optimization schemes do not provide an optimal architecture, but they help Grapes to have a more efficient hierarchical structure. Acknowledgments This work was supported by the Korea Science and Engineering Foundation (KOSEF) through the Advanced Information Technology Research Center (AITrc) and University IT Research Center Project. References [1] Gnutella, [2] Napster, [3] S. Ratnasamy, S. Shenker, and I. Stoica, Routing algorithms for DHTs: Some open questions, Proc. 1st International Workshop on Peer-to-Peer Systems (IPTPS 02), Cambridge, MA, March [4] K. Shin, S. Lee, G. Lim, J. Ma, and H. Yoon, Grapes: Topologybased hierarchical virtual network for peer-to-peer lookup services, Proc. International Workshop on Ad Hoc Network, pp , Vancouver, B.C., Canada, Aug [5] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, A scalable content-addressable network, Proc. ACM SIGCOMM, pp , San Diego, CA, Aug [6] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H. Balakrkshnan, Chord: A scalable peer-to-peer lookup service for Internet applications, Proc. ACM SIGCOMM, pp , San Diego, CA, Aug [7] A. Rowstron and P. Druschel, Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems, Proc. 18th IFIP/ACM Int. Conf. Distributed Systems Platforms (Middleware 2001), pp , Nov [8] B.Y. Zhao, J. Kubiatowicz, and A. Joseph, Tapestry: An infrastructure for fault-tolerant wide-area location and routing, Comput. Sci. Div., Univ. California, Berkeley, Tech. Rep., UCB/CSD , [9] S. Ratnasamy, M. Handley, R. Karp, and S. Shenker, Topologically aware overlay construction and server selection, Proc. IEEE INFO- COM Conference, pp , New York, NY, June [10] K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica, The impact of DHT routing geometry on resilience and proximity, Proc. ACM SIGCOMM, pp , Karlsruhe, Germany, Aug [11] F. Dabek, A cooperative file system, Master s Thesis, Massachusetts Inst. Technol., Cambridge, [12] I. Stoica, R. Morris, D. Liben-Nowell, D.R. Karger, M.F. Kaashoek, F. Dabek, and H. Balakrishnan, Chord: A scalable peer-to-peer lookup protocol for Internet applications, IEEE/ACM Trans. Netw., vol.11, no.1, pp.17 32, Feb [13] B.Y. Zhao, Y. Duan, L. Huang, A.D. Joseph, and J.D. Kubiatowicz, Brocade: Landmark routing on overlay networks, Proc. 1st International Workshop on Peer-to-Peer Systems (IPTPS 02), Cambridge, MA, March Conferences/IPTPS02 [14] L. Garces-Erce, E. Biersack, P. Felber, K.W. Ross, and G. Urvoy- Keller, Hierarchical peer-to-peer systems, Proc. ACM/IFIP International Conference on Parallel and Distributed Computing (Euro- Par), LNCS 2790, pp , Klagenfurt, Austria, [15] K.P. Gummadi, S. Saroiu, and S.D. Gribble, King: Estimating latency between arbitrary Internet end hosts, Proc. SIGCOMM IMW 2002, pp.5 18, Nov [16] P. Francis, S. Jamin, C. Jin, Y. Jin, D. Raz, Y. Shavitt, and L. Zhang, IDMAPS: A global Internet host distance estimation service, IEEE/ACM Trans. Netw., vol.9, no.5, pp , Oct [17] E. Ng and H. Zhang, Predicting Internet network distance with coordinates-based approaches, Proc. IEEE INFOCOM Conference, pp , New York, NY, June [18] D. Malkhi, M. Naor, and D. Ratajczak, Viceroy: A scalable and dynamic emulation of the butterfly, Proc. ACM Conf. on Principles of Distributed Computing (PODC), pp , Monterey, CA, July [19] J. Winick and S. Jamin, Inet-3.0: Internet topology generator, Technical Report CSE-TR , University of Michigan, EECS Dept., [20] Z. Xu, M. Mahalingam, and M. Karlsson, Turning heterogeneity into an advantage in overlay routing, Proc. IEEE INFOCOM Conference, pp , San Francisco, CA, April [21] M. Castro, P. Druschel, Y.C. Hu, and A. Rowstron, Exploiting network proximity in distributed hash tables, Proc. International Workshop on Future Directions in Distributed Computing (FuDiCo), pp.52 55, June [22] M. Castro, P. Druschel, Y.C. Hu, and A. Rowstron, Topology-aware routing in structured peer-to-peer overlay networks, Technical Report MSR-TR , Microsoft Research, [23] S. Ratnasamy, A scalable content-addressable network, Doctor s Dissertation, University of California at Berkeley, 2002.

12 1662 IEICE TRANS. COMMUN., VOL.E90 B, NO.7 JULY 2007 Kwangwook Shin received the B.S. degree in computer science from the Sogang University, Korea, in 1997, the M.S. degree in computer science from the Korea Advanced Institute of Science and Technology (KAIST), in He is currently working toward the Ph.D. degree at the Division of Computer Science, Department of Electrical Engineering and Computer Science, KAIST. His research interests include mobile and wireless communications, mobile ad hoc networks, and peer-to-peer networks. Seunghak Lee received the B.S. degree and the M.S. degree in computer science from the KAIST in 2000 and 2003 respectively. He is currently working toward the Ph.D. degree at the Division of Computer Science, Department of Electrical Engineering and Computer Science, KAIST. His research interests include wireless sensor networks, mobile ad hoc networks, and peer-to-peer networks. Geunhwi Lim received the B.S. degree, the M.S. degree, and the Ph.D. degree in computer science from the KAIST in 1996, 1998, and 2003 respectively. He has been working for the Global Standard and Research team in Samsung Electronics since His research interests include wireless communications, mobile ad hoc networks, and peer-to-peer networks. Hyunsoo Yoon received the B.S. degree in electronics engineering from the Seoul National University, Korea, in 1979, the M.S. degree in computer science from the KAIST, in 1981, and the Ph.D. degree in computer and information science from the Ohio State University, Columbus, Ohio, in From 1988 to 1989, with the AT&T Bell Labs. as a Member of Technical Staff. Since 1989 he has been a Faculty Member of the Division of Computer Science at the KAIST. His research interests include parallel computer architecture, mobile communication, ad hoc networks, and information security.

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems

A Super-Peer Based Lookup in Structured Peer-to-Peer Systems A Super-Peer Based Lookup in Structured Peer-to-Peer Systems Yingwu Zhu Honghao Wang Yiming Hu ECECS Department ECECS Department ECECS Department University of Cincinnati University of Cincinnati University

More information

Should we build Gnutella on a structured overlay? We believe

Should we build Gnutella on a structured overlay? We believe Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured

More information

Early Measurements of a Cluster-based Architecture for P2P Systems

Early Measurements of a Cluster-based Architecture for P2P Systems Early Measurements of a Cluster-based Architecture for P2P Systems Balachander Krishnamurthy, Jia Wang, Yinglian Xie I. INTRODUCTION Peer-to-peer applications such as Napster [4], Freenet [1], and Gnutella

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity

PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity 546 PAPER Special Section on Parallel/Distributed Computing and Networking PChord: Improvement on Chord to Achieve Better Routing Efficiency by Exploiting Proximity Feng HONG a),mingluli,minyouwu, and

More information

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network

A Directed-multicast Routing Approach with Path Replication in Content Addressable Network 2010 Second International Conference on Communication Software and Networks A Directed-multicast Routing Approach with Path Replication in Content Addressable Network Wenbo Shen, Weizhe Zhang, Hongli Zhang,

More information

Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays

Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays Providing Administrative Control and Autonomy in Structured Peer-to-Peer Overlays Alan Mislove Peter Druschel Rice University, Houston, TX, USA Abstract Structured peer-to-peer (p2p) overlay networks provide

More information

Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution

Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution Proximity Based Peer-to-Peer Overlay Networks (P3ON) with Load Distribution Kunwoo Park 1, Sangheon Pack 2, and Taekyoung Kwon 1 1 School of Computer Engineering, Seoul National University, Seoul, Korea

More information

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem

Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Design of a New Hierarchical Structured Peer-to-Peer Network Based On Chinese Remainder Theorem Bidyut Gupta, Nick Rahimi, Henry Hexmoor, and Koushik Maddali Department of Computer Science Southern Illinois

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

Athens University of Economics and Business. Dept. of Informatics

Athens University of Economics and Business. Dept. of Informatics Athens University of Economics and Business Athens University of Economics and Business Dept. of Informatics B.Sc. Thesis Project report: Implementation of the PASTRY Distributed Hash Table lookup service

More information

Scalable and Self-configurable Eduroam by using Distributed Hash Table

Scalable and Self-configurable Eduroam by using Distributed Hash Table Scalable and Self-configurable Eduroam by using Distributed Hash Table Hiep T. Nguyen Tri, Rajashree S. Sokasane, Kyungbaek Kim Dept. Electronics and Computer Engineering Chonnam National University Gwangju,

More information

MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK

MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK 116 MULTI-DOMAIN VoIP PEERING USING OVERLAY NETWORK Herry Imanta Sitepu, Carmadi Machbub, Armein Z. R. Langi, Suhono Harso Supangkat School of Electrical Engineering and Informatics, Institut Teknologi

More information

HyCube: A distributed hash table based on a hierarchical hypercube geometry

HyCube: A distributed hash table based on a hierarchical hypercube geometry HyCube: A distributed hash table based on a hierarchical hypercube geometry Artur Olszak Institute of Computer Science, Warsaw University of Technology A.Olszak@ii.pw.edu.pl Abstract. This paper presents

More information

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables

A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables A Structured Overlay for Non-uniform Node Identifier Distribution Based on Flexible Routing Tables Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku,

More information

Architectures for Distributed Systems

Architectures for Distributed Systems Distributed Systems and Middleware 2013 2: Architectures Architectures for Distributed Systems Components A distributed system consists of components Each component has well-defined interface, can be replaced

More information

Survey of DHT Evaluation Methods

Survey of DHT Evaluation Methods Survey of DHT Evaluation Methods Markus Meriläinen Helsinki University of Technology Markus.Merilainen@tkk.fi Abstract In this paper, we present an overview of factors affecting the performance of the

More information

BOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS

BOOTSTRAPPING LOCALITY-AWARE P2P NETWORKS BOOTSTRAPPING LOCALITY-AWARE PP NETWORKS Curt Cramer, Kendy Kutzner, and Thomas Fuhrmann Institut für Telematik, Universität Karlsruhe (TH), Germany {curt.cramer kendy.kutzner thomas.fuhrmann}@ira.uka.de

More information

Understanding Chord Performance

Understanding Chord Performance CS68 Course Project Understanding Chord Performance and Topology-aware Overlay Construction for Chord Li Zhuang(zl@cs), Feng Zhou(zf@cs) Abstract We studied performance of the Chord scalable lookup system

More information

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others

Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Dynamic Load Sharing in Peer-to-Peer Systems: When some Peers are more Equal than Others Sabina Serbu, Silvia Bianchi, Peter Kropf and Pascal Felber Computer Science Department, University of Neuchâtel

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

A Framework for Peer-To-Peer Lookup Services based on k-ary search

A Framework for Peer-To-Peer Lookup Services based on k-ary search A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology

More information

Relaxing Routing Table to Alleviate Dynamism in P2P Systems

Relaxing Routing Table to Alleviate Dynamism in P2P Systems Relaxing Routing Table to Alleviate Dynamism in P2P Systems Hui FANG 1, Wen Jing HSU 2, and Larry RUDOLPH 3 1 Singapore-MIT Alliance, National University of Singapore 2 Nanyang Technological University,

More information

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks

Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks Y. Charlie Hu, Saumitra M. Das, and Himabindu Pucha Purdue University West Lafayette, IN 47907 {ychu, smdas, hpucha}@purdue.edu Abstract

More information

Fault Resilience of Structured P2P Systems

Fault Resilience of Structured P2P Systems Fault Resilience of Structured P2P Systems Zhiyu Liu 1, Guihai Chen 1, Chunfeng Yuan 1, Sanglu Lu 1, and Chengzhong Xu 2 1 National Laboratory of Novel Software Technology, Nanjing University, China 2

More information

Data Indexing and Querying in DHT Peer-to-Peer Networks

Data Indexing and Querying in DHT Peer-to-Peer Networks Institut EURECOM Research Report N o 73 RR-03-073 Data Indexing and Querying in DHT Peer-to-Peer Networks P.A. Felber, E.W. Biersack, L. Garcés-Erice, K.W. Ross, G. Urvoy-Keller January 15, 2003 2 Data

More information

ReCord: A Distributed Hash Table with Recursive Structure

ReCord: A Distributed Hash Table with Recursive Structure ReCord: A Distributed Hash Table with Recursive Structure Jianyang Zeng and Wen-Jing Hsu Abstract We propose a simple distributed hash table called ReCord, which is a generalized version of Randomized-

More information

Hybrid Overlay Structure Based on Random Walks

Hybrid Overlay Structure Based on Random Walks Hybrid Overlay Structure Based on Random Walks Ruixiong Tian 1,, Yongqiang Xiong 2, Qian Zhang 2,BoLi 3, Ben Y. Zhao 4, and Xing Li 1 1 Department of Electronic Engineering, Tsinghua University 2 Microsoft

More information

P2P Overlay Networks of Constant Degree

P2P Overlay Networks of Constant Degree P2P Overlay Networks of Constant Degree Guihai Chen,2, Chengzhong Xu 2, Haiying Shen 2, and Daoxu Chen State Key Lab of Novel Software Technology, Nanjing University, China 2 Department of Electrical and

More information

To Unify Structured and Unstructured P2P Systems

To Unify Structured and Unstructured P2P Systems To Unify Structured and Unstructured P2P Systems Honghao Wang, Yingwu Zhu and Yiming Hu Department of Electrical & Computer Engineering and Computer Science University of Cincinnati e-mail: {wanghong,

More information

A Distributed Codec Placement Algorithm for Network-Embedded FEC

A Distributed Codec Placement Algorithm for Network-Embedded FEC A Distributed Codec Placement Algorithm for Network-Embedded FEC Mingquan Wu and Hayder Radha Department of Electrical and Computer Engineering Michigan State University East Lansing, MI 48823 {wumingqu,

More information

DATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems

DATA. The main challenge in P2P computing is to design and implement LOOKING UP. in P2P Systems LOOKING UP DATA in P2P Systems By Hari Balakrishnan, M. Frans Kaashoek, David Karger, Robert Morris, and Ion Stoica The main challenge in P2P computing is to design and implement a robust and scalable

More information

Evolution of Peer-to-peer algorithms: Past, present and future.

Evolution of Peer-to-peer algorithms: Past, present and future. Evolution of Peer-to-peer algorithms: Past, present and future. Alexei Semenov Helsinki University of Technology alexei.semenov@hut.fi Abstract Today peer-to-peer applications are widely used for different

More information

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................

More information

Effect of Links on DHT Routing Algorithms 1

Effect of Links on DHT Routing Algorithms 1 Effect of Links on DHT Routing Algorithms 1 Futai Zou, Liang Zhang, Yin Li, Fanyuan Ma Department of Computer Science and Engineering Shanghai Jiao Tong University, 200030 Shanghai, China zoufutai@cs.sjtu.edu.cn

More information

UC Berkeley UC Berkeley Previously Published Works

UC Berkeley UC Berkeley Previously Published Works UC Berkeley UC Berkeley Previously Published Works Title Impact of neighbor selection on performance and resilience of structured P2P networks Permalink https://escholarship.org/uc/item/9tq2wn2 Authors

More information

Brocade: Landmark Routing on Overlay Networks

Brocade: Landmark Routing on Overlay Networks Abstract Brocade: Landmark Routing on Overlay Networks CS262A Fall 2001 Yitao Duan, Ling Huang University of California, Berkeley duan@cs.berkeley.edu, hlion@newton.berkeley.edu Peer-to-peer networks offer

More information

Location Efficient Proximity and Interest Clustered P2p File Sharing System

Location Efficient Proximity and Interest Clustered P2p File Sharing System Location Efficient Proximity and Interest Clustered P2p File Sharing System B.Ajay Kumar M.Tech, Dept of Computer Science & Engineering, Usharama College of Engineering & Technology, A.P, India. Abstract:

More information

Degree Optimal Deterministic Routing for P2P Systems

Degree Optimal Deterministic Routing for P2P Systems Degree Optimal Deterministic Routing for P2P Systems Gennaro Cordasco Luisa Gargano Mikael Hammar Vittorio Scarano Abstract We propose routing schemes that optimize the average number of hops for lookup

More information

Defending against Eclipse attacks on overlay networks

Defending against Eclipse attacks on overlay networks Defending against Eclipse attacks on overlay networks Atul Singh 1 Miguel Castro 2 Peter Druschel 1 Antony Rowstron 2 1 Rice University, Houston, TX, USA. 2 Microsoft Research, Cambridge, UK. Abstract

More information

Comparing the performance of distributed hash tables under churn

Comparing the performance of distributed hash tables under churn Comparing the performance of distributed hash tables under churn Jinyang Li, Jeremy Stribling, Thomer M. Gil, Robert Morris, M. Frans Kaashoek MIT Computer Science and Artificial Intelligence Laboratory

More information

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design

A Peer-to-Peer Architecture to Enable Versatile Lookup System Design A Peer-to-Peer Architecture to Enable Versatile Lookup System Design Vivek Sawant Jasleen Kaur University of North Carolina at Chapel Hill, Chapel Hill, NC, USA vivek, jasleen @cs.unc.edu Abstract The

More information

An Efficient and Secure Peer-to-Peer Overlay Network

An Efficient and Secure Peer-to-Peer Overlay Network An Efficient and Secure Peer-to-Peer Overlay Network Honghao Wang, Yingwu Zhu and Yiming Hu Department of Electrical & Computer Engineering and Computer Science University of Cincinnati {wanghong, zhuy,

More information

Dorina Luminiţa COPACI, Constantin Alin COPACI

Dorina Luminiţa COPACI, Constantin Alin COPACI THE DESIGN OF RESILIENCE P2P NETWORKS WITH DISTRIBUTED HASH TABLES Dorina Luminiţa COPACI, Constantin Alin COPACI lcopaci@yahoo.com, acopaci@yahoo.com Abstract The term resilience in computer systems and

More information

A Scalable Content- Addressable Network

A Scalable Content- Addressable Network A Scalable Content- Addressable Network In Proceedings of ACM SIGCOMM 2001 S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Presented by L.G. Alex Sung 9th March 2005 for CS856 1 Outline CAN basics

More information

Security Considerations for Peer-to-Peer Distributed Hash Tables

Security Considerations for Peer-to-Peer Distributed Hash Tables Security Considerations for Peer-to-Peer Distributed Hash Tables Emil Sit and Robert Morris Laboratory for Computer Science, MIT 200 Technology Square, Cambridge, MA 02139, USA {sit,rtm}@lcs.mit.edu Abstract.

More information

Three Layer Hierarchical Model for Chord

Three Layer Hierarchical Model for Chord Three Layer Hierarchical Model for Chord Waqas A. Imtiaz, Shimul Shil, A.K.M Mahfuzur Rahman Abstract Increasing popularity of decentralized Peer-to-Peer (P2P) architecture emphasizes on the need to come

More information

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS

DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS DYNAMIC TREE-LIKE STRUCTURES IN P2P-NETWORKS Herwig Unger Markus Wulff Department of Computer Science University of Rostock D-1851 Rostock, Germany {hunger,mwulff}@informatik.uni-rostock.de KEYWORDS P2P,

More information

Reducing Outgoing Traffic of Proxy Cache by Using Client-Cluster

Reducing Outgoing Traffic of Proxy Cache by Using Client-Cluster Reducing Outgoing Traffic of Proxy Cache by Using Client-Cluster Kyungbaek Kim and Daeyeon Park Abstract: Many web cache systems and policies concerning them have been proposed. These studies, however,

More information

A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays

A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays A Method for Designing Proximity-aware Routing Algorithms for Structured Overlays Takehiro Miyao, Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku, Tokyo, JAPAN Email:

More information

Bandwidth Consumption Efficiency Using Collective Rejoin in Hierarchical Peer-To-Peer

Bandwidth Consumption Efficiency Using Collective Rejoin in Hierarchical Peer-To-Peer 908 JOURNAL OF NETWORKS, VOL. 9, NO. 4, APRIL 2014 Bandwidth Consumption Efficiency Using Collective Rejoin in Hierarchical Peer-To-Peer Sri Wahjuni, A.A.Putri Ratna, and Kalamullah Ramli Department of

More information

Layer Optimization for DHT-based Peer-to-Peer Network

Layer Optimization for DHT-based Peer-to-Peer Network Layer Optimization for DHT-based Peer-to-Peer Network Jun Li *, Cuilian Li, Zhaoxi Fang Department of Telecommunication Zhejiang Wanli University Ningbo, China xxllj, licl@zwu.edu.cn, zhaoxifang@gmail.com

More information

Peer-to-Peer Systems. Chapter General Characteristics

Peer-to-Peer Systems. Chapter General Characteristics Chapter 2 Peer-to-Peer Systems Abstract In this chapter, a basic overview is given of P2P systems, architectures, and search strategies in P2P systems. More specific concepts that are outlined include

More information

Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks

Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Byung-Gon Chun, Ben Y. Zhao 2, and John D. Kubiatowicz Computer Science Division, U.C. Berkeley {bgchun, kubitron}@cs.berkeley.edu

More information

P2P: Distributed Hash Tables

P2P: Distributed Hash Tables P2P: Distributed Hash Tables Chord + Routing Geometries Nirvan Tyagi CS 6410 Fall16 Peer-to-peer (P2P) Peer-to-peer (P2P) Decentralized! Hard to coordinate with peers joining and leaving Peer-to-peer (P2P)

More information

Time-related replication for p2p storage system

Time-related replication for p2p storage system Seventh International Conference on Networking Time-related replication for p2p storage system Kyungbaek Kim E-mail: University of California, Irvine Computer Science-Systems 3204 Donald Bren Hall, Irvine,

More information

A Scalable and Robust QoS Architecture for WiFi P2P Networks

A Scalable and Robust QoS Architecture for WiFi P2P Networks A Scalable and Robust QoS Architecture for WiFi P2P Networks Sathish Rajasekhar, Ibrahim Khalil, and Zahir Tari School of Computer Science and Information Technology, RMIT University, Melbourne - 3000

More information

An Agenda for Robust Peer-to-Peer Storage

An Agenda for Robust Peer-to-Peer Storage An Agenda for Robust Peer-to-Peer Storage Rodrigo Rodrigues Massachusetts Institute of Technology rodrigo@lcs.mit.edu Abstract Robust, large-scale storage is one of the main applications of DHTs and a

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

Topology-Centric Look-Up Service

Topology-Centric Look-Up Service Topology-Centric Look-Up Service L. Garcés-Erice 1, K.W. Ross 2, E.W. Biersack 1, P.A. Felber 1, and G. Urvoy-Keller 1 1 Institut EURECOM 06904 Sophia Antipolis, France {garces erbi felber urvoy}@eurecom.fr

More information

Application Layer Multicast For Efficient Peer-to-Peer Applications

Application Layer Multicast For Efficient Peer-to-Peer Applications Application Layer Multicast For Efficient Peer-to-Peer Applications Adam Wierzbicki 1 e-mail: adamw@icm.edu.pl Robert Szczepaniak 1 Marcin Buszka 1 1 Polish-Japanese Institute of Information Technology

More information

Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network

Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Haiying Shen and Cheng-Zhong Xu, Wayne State University, Detroit, MI 48202 Guihai Chen, Nanjing University, Nanjing, China {shy,czxu,gchen}@ece.eng.wayne.edu

More information

Exploiting Semantic Clustering in the edonkey P2P Network

Exploiting Semantic Clustering in the edonkey P2P Network Exploiting Semantic Clustering in the edonkey P2P Network S. Handurukande, A.-M. Kermarrec, F. Le Fessant & L. Massoulié Distributed Programming Laboratory, EPFL, Switzerland INRIA, Rennes, France INRIA-Futurs

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS

DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS DISTRIBUTED HASH TABLE PROTOCOL DETECTION IN WIRELESS SENSOR NETWORKS Mr. M. Raghu (Asst.professor) Dr.Pauls Engineering College Ms. M. Ananthi (PG Scholar) Dr. Pauls Engineering College Abstract- Wireless

More information

An Expresway over Chord in Peer-to-Peer Systems

An Expresway over Chord in Peer-to-Peer Systems An Expresway over Chord in Peer-to-Peer Systems Hathai Tanta-ngai Technical Report CS-2005-19 October 18, 2005 Faculty of Computer Science 6050 University Ave., Halifax, Nova Scotia, B3H 1W5, Canada An

More information

Chord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications

Chord : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications : A Scalable Peer-to-Peer Lookup Protocol for Internet Applications Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashock, Frank Dabek, Hari Balakrishnan March 4, 2013 One slide

More information

A Proximity Knowledge on Passion Clustered P2p Distributed File System

A Proximity Knowledge on Passion Clustered P2p Distributed File System A Proximity Knowledge on Passion Clustered P2p Distributed File System R.Lakshmana Rao PG Scholar, Dept of CSE, Pydah College of Engineering and Technology, Visakhapatnam, AP, India. K.Saran Kumar Assistant

More information

A P2P File Sharing Technique by Indexed-Priority Metric

A P2P File Sharing Technique by Indexed-Priority Metric A P2P File Sharing Technique by Indexed-Priority Metric Toshinori Takabatake and Yoshikazu Komano Abstract Recently, the improvements in processing performance of a computer and in high speed communication

More information

PIC: Practical Internet Coordinates for Distance Estimation

PIC: Practical Internet Coordinates for Distance Estimation PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa, Miguel Castro, Antony Rowstron, and Peter Key Microsoft Research, Cambridge, CB3 FB, UK Abstract This paper introduces PIC, a practical

More information

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems.

EARM: An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. : An Efficient and Adaptive File Replication with Consistency Maintenance in P2P Systems. 1 K.V.K.Chaitanya, 2 Smt. S.Vasundra, M,Tech., (Ph.D), 1 M.Tech (Computer Science), 2 Associate Professor, Department

More information

Load Sharing in Peer-to-Peer Networks using Dynamic Replication

Load Sharing in Peer-to-Peer Networks using Dynamic Replication Load Sharing in Peer-to-Peer Networks using Dynamic Replication S Rajasekhar, B Rong, K Y Lai, I Khalil and Z Tari School of Computer Science and Information Technology RMIT University, Melbourne 3, Australia

More information

Query Processing Over Peer-To-Peer Data Sharing Systems

Query Processing Over Peer-To-Peer Data Sharing Systems Query Processing Over Peer-To-Peer Data Sharing Systems O. D. Şahin A. Gupta D. Agrawal A. El Abbadi Department of Computer Science University of California at Santa Barbara odsahin, abhishek, agrawal,

More information

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network

A Top Catching Scheme Consistency Controlling in Hybrid P2P Network A Top Catching Scheme Consistency Controlling in Hybrid P2P Network V. Asha*1, P Ramesh Babu*2 M.Tech (CSE) Student Department of CSE, Priyadarshini Institute of Technology & Science, Chintalapudi, Guntur(Dist),

More information

Overlay Networks for Multimedia Contents Distribution

Overlay Networks for Multimedia Contents Distribution Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)

More information

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems

AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems AOTO: Adaptive Overlay Topology Optimization in Unstructured P2P Systems Yunhao Liu, Zhenyun Zhuang, Li Xiao Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824

More information

Quasi-Chord: physical topology aware structured P2P network

Quasi-Chord: physical topology aware structured P2P network Quasi-Chord: physical topology aware structured PP network UN Mingsong ZHANG Zhongqiu Network Information Center, Harbin University of cience and Technology, China College of Computer ci&tech, Harbin University

More information

On the Cost of Participating in a Peer-to-Peer Network

On the Cost of Participating in a Peer-to-Peer Network On the Cost of Participating in a Peer-to-Peer etwork icolas Christin and John Chuang School of Information Management and Systems, University of California, Berkeley {christin,chuang}@sims.berkeley.edu

More information

DRing: A Layered Scheme for Range Queries over DHTs

DRing: A Layered Scheme for Range Queries over DHTs DRing: A Layered Scheme for Range Queries over DHTs Nicolas Hidalgo, Erika Rosas, Luciana Arantes, Olivier Marin, Pierre Sens and Xavier Bonnaire Université Pierre et Marie Curie, CNRS INRIA - REGAL, Paris,

More information

Implications of Neighbor Selection on DHT Overlays

Implications of Neighbor Selection on DHT Overlays Implications of Neighbor Selection on DHT Overlays Yingwu Zhu Department of CSSE, Seattle University zhuy@seattleu.edu Xiaoyu Yang Department of ECECS, University of Cincinnati yangxu@ececs.uc.edu Abstract

More information

Evaluation and Comparison of Mvring and Tree Based Application Layer Multicast on Structured Peer-To-Peer Overlays

Evaluation and Comparison of Mvring and Tree Based Application Layer Multicast on Structured Peer-To-Peer Overlays Journal of Computer Science (): xx-xx, ISS 49-66 Science Publications Evaluation and Comparison of Mvring and Tree Based Application Layer Multicast on Structured Peer-To-Peer Overlays Surya Bahadur Kathayat,

More information

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit

More information

Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup

Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup Structured Superpeers: Leveraging Heterogeneity to Provide Constant-Time Lookup Alper Mizrak (Presenter) Yuchung Cheng Vineet Kumar Stefan Savage Department of Computer Science & Engineering University

More information

QoS Enabled Multicast for Structured P2P Networks

QoS Enabled Multicast for Structured P2P Networks QoS Enabled Multicast for Structured P2P Networks Marc Brogle, Dragan Milic and Torsten Braun Computer Networks and Distributed Systems Institute of Computer Science and Applied Mathematics University

More information

Mill: Scalable Area Management for P2P Network based on Geographical Location

Mill: Scalable Area Management for P2P Network based on Geographical Location Mill: Scalable Area Management for PP Network based on Geographical Location MATSUURA Satoshi sato-mat@is.naist.jp FUJIKAWA Kazutoshi fujikawa@itc.naist.jp SUNAHARA Hideki suna@wide.ad.jp Graduate School

More information

SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks

SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks SplitQuest: Controlled and Exhaustive Search in Peer-to-Peer Networks Pericles Lopes Ronaldo A. Ferreira pericles@facom.ufms.br raf@facom.ufms.br College of Computing, Federal University of Mato Grosso

More information

Adaptive Load Balancing for DHT Lookups

Adaptive Load Balancing for DHT Lookups Adaptive Load Balancing for DHT Lookups Silvia Bianchi, Sabina Serbu, Pascal Felber and Peter Kropf University of Neuchâtel, CH-, Neuchâtel, Switzerland {silvia.bianchi, sabina.serbu, pascal.felber, peter.kropf}@unine.ch

More information

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems

LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems LessLog: A Logless File Replication Algorithm for Peer-to-Peer Distributed Systems Kuang-Li Huang, Tai-Yi Huang and Jerry C. Y. Chou Department of Computer Science National Tsing Hua University Hsinchu,

More information

FPN: A Distributed Hash Table for Commercial Applications

FPN: A Distributed Hash Table for Commercial Applications FPN: A Distributed Hash Table for Commercial Applications Cezary Dubnicki, Cristian Ungureanu, Wojciech Kilian NEC Laboratories Princeton, NJ, USA {dubnicki, cristian, wkilian}@nec-labs.com Abstract Distributed

More information

Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy

Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy Survive Under High Churn in Structured P2P Systems: Evaluation and Strategy Zhiyu Liu, Ruifeng Yuan, Zhenhua Li, Hongxing Li, and Guihai Chen State Key Laboratory of Novel Software Technology, Nanjing

More information

Adaptive Replication and Replacement in P2P Caching

Adaptive Replication and Replacement in P2P Caching Adaptive Replication and Replacement in P2P Caching Jussi Kangasharju Keith W. Ross Abstract Caching large audio and video files in a community of peers is a compelling application for P2P. Assuming an

More information

Shaking Service Requests in Peer-to-Peer Video Systems

Shaking Service Requests in Peer-to-Peer Video Systems Service in Peer-to-Peer Video Systems Ying Cai Ashwin Natarajan Johnny Wong Department of Computer Science Iowa State University Ames, IA 500, U. S. A. E-mail: {yingcai, ashwin, wong@cs.iastate.edu Abstract

More information

Lecture-2 Content Sharing in P2P Networks Different P2P Protocols

Lecture-2 Content Sharing in P2P Networks Different P2P Protocols Lecture-2 Content Sharing in P2P Networks Different P2P Protocols Zhou Shuigeng March 10, 2005 Outline Classification of content sharing P2P systems Content sharing P2P systems Napster; Gnutella; Freenet

More information

Distributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016

Distributed Systems. 17. Distributed Lookup. Paul Krzyzanowski. Rutgers University. Fall 2016 Distributed Systems 17. Distributed Lookup Paul Krzyzanowski Rutgers University Fall 2016 1 Distributed Lookup Look up (key, value) Cooperating set of nodes Ideally: No central coordinator Some nodes can

More information

This is the published version:

This is the published version: This is the published version: Zhou, Wanlei and Casey, J. 2008, Reducing cache lookup and publish overhead through locality awareness in P2P web caching, in HPCC 2008 : Proceedings of the 10th IEEE International

More information

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery Shawn Chen 1, Steve Liang 2 1 Geomatics, University of Calgary, hschen@ucalgary.ca 2 Geomatics, University of Calgary, steve.liang@ucalgary.ca

More information

Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries

Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries Modifying the Overlay Network of Freenet-style Peer-to-Peer Systems after Successful Request Queries Jens Mache, David Ely, Melanie Gilbert, Jason Gimba, Thierry Lopez and Matthew Wilkinson Lewis & Clark

More information

Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network

Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Cycloid: A Constant-Degree and Lookup-Efficient P2P Overlay Network Haiying Shen and Cheng-Zhong Xu Department of Electrical & Computer Engg. Wayne State University, Detroit, MI 48202 {shy,czxu}@ece.eng.wayne.edu

More information

Heterogeneity-Aware Peer-to-Peer Multicast

Heterogeneity-Aware Peer-to-Peer Multicast Heterogeneity-Aware Peer-to-Peer Multicast Robbert van Renesse 1 Ken Birman 1 Adrian Bozdog 1 Dan Dumitriu 2 Manpreet Singh 1 Werner Vogels 1 1 Dept. of Computer Science, Cornell University {rvr,ken,adrianb,manpreet,vogels}@cs.cornell.edu

More information